IOC Report
Set-up.exe

loading gif

Files

File Path
Type
Category
Malicious
Set-up.exe
PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_chrome.exe_6529d8499c11cd4f9e25b8c1dc6756637128dac_19d51899_09214adb-9fd0-44c0-a0e9-1d32bf30b89f\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_chrome.exe_6529d8499c11cd4f9e25b8c1dc6756637128dac_19d51899_839c2440-3000-4f8a-b3ac-c02cf614e8a6\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_chrome.exe_6529d8499c11cd4f9e25b8c1dc6756637128dac_19d51899_9075c3c4-a6e6-45ed-ade9-137bd9ff37d2\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_chrome.exe_653df720363a23f9fbf1c3440f42767b874ec_19d51899_3be725a7-7bec-402d-912c-5b6e1b4103ce\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_chrome.exe_653df720363a23f9fbf1c3440f42767b874ec_19d51899_c2374def-a73f-4e01-95b4-340ccaa2b026\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_chrome.exe_653df720363a23f9fbf1c3440f42767b874ec_19d51899_d5b0c01f-b54c-461f-bcf0-11216f7d913a\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_msedge.exe_6e7a37746f818a347830ea1e976120e73daecf72_75709460_5165434c-287c-474f-a884-9d1a74be8407\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_msedge.exe_6e7a37746f818a347830ea1e976120e73daecf72_75709460_b01ff826-0a9d-4c99-9877-b3edef4f4d6f\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_msedge.exe_6e7a37746f818a347830ea1e976120e73daecf72_75709460_b102db5d-74bf-4bf9-9096-aa63fdbc572a\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_msedge.exe_b2183e612ae09e2d847ad213d2fdf44b96d97240_75709460_6cc951a1-00ca-4995-8233-9f6060a8e2f7\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_msedge.exe_b2183e612ae09e2d847ad213d2fdf44b96d97240_75709460_7e0abad9-a362-4765-a520-880ef44139fd\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_msedge.exe_b2183e612ae09e2d847ad213d2fdf44b96d97240_75709460_ce6506a8-9fc7-42cc-ba07-4b1639dcbce0\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER6B32.tmp.dmp
Mini DuMP crash report, 14 streams, Sat May 10 06:05:31 2025, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER6BA0.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER6BDF.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER7071.tmp.dmp
Mini DuMP crash report, 14 streams, Sat May 10 06:05:32 2025, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER70B1.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER70E1.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER7757.tmp.dmp
Mini DuMP crash report, 14 streams, Sat May 10 06:05:34 2025, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER77C5.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER77F5.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER7B8D.tmp.dmp
Mini DuMP crash report, 14 streams, Sat May 10 06:05:35 2025, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER7BCD.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER7C0C.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER89B6.tmp.dmp
Mini DuMP crash report, 14 streams, Sat May 10 06:05:39 2025, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER89F6.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER8A25.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER8BAA.tmp.dmp
Mini DuMP crash report, 14 streams, Sat May 10 06:05:39 2025, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER8C09.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER8C29.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER90DA.tmp.dmp
Mini DuMP crash report, 14 streams, Sat May 10 06:05:40 2025, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER9129.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER9188.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER938A.tmp.dmp
Mini DuMP crash report, 14 streams, Sat May 10 06:05:41 2025, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER93C9.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER9428.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERA53D.tmp.dmp
Mini DuMP crash report, 14 streams, Sat May 10 06:05:46 2025, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERA58C.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERA5BC.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERA992.tmp.dmp
Mini DuMP crash report, 14 streams, Sat May 10 06:05:47 2025, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERA9F1.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERAA21.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERB105.tmp.dmp
Mini DuMP crash report, 14 streams, Sat May 10 06:05:49 2025, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERB134.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERB155.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERB51B.tmp.dmp
Mini DuMP crash report, 14 streams, Sat May 10 06:05:50 2025, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERB599.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERB5F8.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped
There are 40 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\Set-up.exe
"C:\Users\user\Desktop\Set-up.exe"
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe"
malicious
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe"
malicious
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe"
malicious
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe"
malicious
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"
malicious
C:\Program Files (x86)\Microsoft\Edge\Application\117.0.2045.47\elevation_service.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\117.0.2045.47\elevation_service.exe"
C:\Windows\System32\WerFault.exe
C:\Windows\system32\WerFault.exe -u -p 5760 -s 144
C:\Windows\System32\WerFault.exe
C:\Windows\system32\WerFault.exe -u -p 5760 -s 204
C:\Windows\System32\WerFault.exe
C:\Windows\system32\WerFault.exe -u -p 1380 -s 224
C:\Windows\System32\WerFault.exe
C:\Windows\system32\WerFault.exe -u -p 1380 -s 92
C:\Windows\System32\WerFault.exe
C:\Windows\system32\WerFault.exe -u -p 2444 -s 152
C:\Windows\System32\WerFault.exe
C:\Windows\system32\WerFault.exe -u -p 2444 -s 92
C:\Windows\System32\WerFault.exe
C:\Windows\system32\WerFault.exe -u -p 3832 -s 228
C:\Windows\System32\WerFault.exe
C:\Windows\system32\WerFault.exe -u -p 3832 -s 92
C:\Windows\System32\WerFault.exe
C:\Windows\system32\WerFault.exe -u -p 4544 -s 144
C:\Windows\System32\WerFault.exe
C:\Windows\system32\WerFault.exe -u -p 4544 -s 92
C:\Windows\System32\WerFault.exe
C:\Windows\system32\WerFault.exe -u -p 4988 -s 224
C:\Windows\System32\WerFault.exe
C:\Windows\system32\WerFault.exe -u -p 4988 -s 92
There are 12 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://mcrsftuptade.pro/Up/g
188.114.96.3
malicious
http://mcrsftuptade.pro/Up/p
188.114.96.3
malicious
http://mcrsftuptade.pro/Up/b
188.114.96.3
malicious
http://mcrsftuptade.pro/ujs/f1575b64-8492-4e8b-b102-4d26e8c70371
188.114.96.3
malicious
http://mcrsftuptade.pro/Up
188.114.96.3
malicious
http://acs.amazonaws.com/groups/global/AllUsers
unknown
https://duckduckgo.com/ac/?q=
unknown
https://www.fsf.org/
unknown
http://169.254.169.254/latest/meta-data/iam/security-credentials/Retrieving
unknown
http://h1.coldwalk.top/sh.ext.exe.bin
unknown
https://jrsoftware.org/tb2kdl.php
unknown
https://winscp.net/eng/docs/?ver=%s&lang=%s-https://winscp.net/eng/docs/%s?ver=%s&lang=%s
unknown
http://webdav.org/neon/hooks/webdav-lockingHas
unknown
http://schemas.xmlsoap.org/soap/envelope/
unknown
http://webdav.org/neon/hooks/webdav-lockinghttp://webdav.org/neon/hooks/webdav-lockingLocked
unknown
https://winscp.net/eng/donate.php
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
http://webdav.org/neon/hooks/server-authhttp://webdav.org/neon/hooks/proxy-authhttp://webdav.org/neo
unknown
http://www.webdav.org/neon/hooks/http-redirecthttp://www.webdav.org/neon/hooks/http-redirectAborted
unknown
http://webdav.org/neon/hooks/proxy-auth
unknown
https://www.google.com/images/branding/product/ico/googleg_alldp.ico
unknown
http://www.borland.com/namespaces/Types
unknown
https://www.chiark.greenend.org.uk/~sgtatham/putty/
unknown
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
http://acs.amazonaws.com/groups/s3/LogDelivery
unknown
https://winscp.net/#https://winscp.net/eng/docs/history
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
http://apache.org/dav/propset/fs/1
unknown
https://duckduckgo.com/chrome_newtabv209h
unknown
https://winscp.net/updates.php#https://winscp.net/eng/download.php
unknown
https://www.gnu.org/licenses/why-not-lgpl.html
unknown
http://webdav.org/neon/hooks/proxy-authProxy-AuthorizationProxy-AuthenticateProxy-Authentication-Inf
unknown
http://webdav.org/neon/hooks/webdav-locking
unknown
http://apache.org/dav/props/T
unknown
http://www.webdav.org/neon/hooks/http-redirect
unknown
http://h1.coldwalk.top/amshm.bin
unknown
http://www.webdav.org/neon/hooks/http-passport-req
unknown
http://XXXXXXwinscp.net/
unknown
http://schemas.xmlsoap.org/soap/encoding/
unknown
https://openssl-library.org/)WebDAV/HTTP
unknown
https://www.gnu.org/licenses/
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://crl.rootca1.amazontrust.com/rootca1.crl0
unknown
https://ac.ecosia.org?q=
unknown
http://upx.sf.net
unknown
http://ocsp.rootca1.amazontrust.com0:
unknown
https://jcl.delphi-jedi.org/
unknown
http://www.webdav.org/neon/hooks/http-passport-reqWWW-AuthenticatePassport1.4Passport1.4http://www.w
unknown
http://webdav.org/neon/hooks/server-auth
unknown
https://www.ecosia.org/newtab/v20
unknown
http://XXXXwinscp.net/forum/
unknown
https://github.com/bji/libs30https://github.com/bji/libs3/blob/master/LICENSE$Error
unknown
https://winscp.net/D
unknown
http://crt.rootca1.amazontrust.com/rootca1.cer0?
unknown
https://github.com/UweRaabe/PngComponents
unknown
https://winscp.net/forum/
unknown
http://winscp.net/schema/session/1.0
unknown
http://apache.org/dav/props/
unknown
http://webdav.org/neon/hooks/server-authAuthorizationWWW-AuthenticateAuthentication-InfoCould
unknown
http://webdav.org/neon/hooks/webdav-lockinghttp://webdav.org/neon/hooks/webdav-lockinglock:
unknown
https://winscp.net/eng/translations.php:https://winscp.net/eng/docs/search.php?ver=%s&lang=%s&q=%sKh
unknown
http://acs.amazonaws.com/groups/global/AuthenticatedUsers
unknown
https://notroj.github.io/neon/
unknown
https://filezilla-project.org/bThis
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
https://gemini.google.com/app?q=
unknown
http://h1.coldwalk.top/shark.bin
unknown
https://github.com/plashenkov/TBX
unknown
There are 59 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
bg.microsoft.map.fastly.net
199.232.210.172
pki-goog.l.google.com
142.250.68.227
c.pki.goog
unknown

IPs

IP
Domain
Country
Malicious
188.114.96.3
unknown
European Union
malicious

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
state
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\ThirdParty
StatusCodes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\ThirdParty
StatusCodes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
failed_count
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
failed_count
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
state
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
failed_count

Memdumps

Base Address
Regiontype
Protect
Malicious
296E000
stack
page read and write
4F74000
trusted library allocation
page read and write
743800294000
trusted library allocation
page read and write
772C00274000
trusted library allocation
page read and write
10AA0000
trusted library allocation
page read and write
21C4022E000
heap
page read and write
480F000
stack
page read and write
1BEE000
unkown
page write copy
1C72B180000
remote allocation
page execute and read and write
4E18000
trusted library allocation
page read and write
10B27000
trusted library allocation
page read and write
743800238000
trusted library allocation
page read and write
505F000
trusted library allocation
page read and write
4EC6000
trusted library allocation
page read and write
10C6B000
trusted library allocation
page read and write
14384260000
heap
page read and write
772C00220000
trusted library allocation
page read and write
11517FB000
stack
page read and write
256400220000
trusted library allocation
page read and write
10C74000
trusted library allocation
page read and write
10A74000
trusted library allocation
page read and write
1C72B21A000
heap
page read and write
2672000
direct allocation
page read and write
7438002B8000
trusted library allocation
page read and write
772C00250000
trusted library allocation
page read and write
10A6E000
trusted library allocation
page read and write
4F4A000
trusted library allocation
page read and write
1FB4001A000
heap
page read and write
25A0000
heap
page read and write
3BB000098000
trusted library allocation
page read and write
10C82000
trusted library allocation
page read and write
4E65000
trusted library allocation
page read and write
10B10000
trusted library allocation
page read and write
772C00238000
trusted library allocation
page read and write
10ADF000
trusted library allocation
page read and write
772C002B8000
trusted library allocation
page read and write
6EB80002C000
trusted library allocation
page read and write
4C09000
trusted library allocation
page read and write
4BAE000
trusted library allocation
page read and write
10CF7000
trusted library allocation
page read and write
250E3A02000
heap
page read and write
44D0000
heap
page read and write
3BB00002C000
trusted library allocation
page read and write
10A00000
trusted library allocation
page read and write
27687A30000
heap
page read and write
10D57000
trusted library allocation
page read and write
297CF402000
heap
page read and write
4F72000
trusted library allocation
page read and write
256400270000
trusted library allocation
page read and write
1B49000
unkown
page read and write
10C77000
trusted library allocation
page read and write
1BE2000
unkown
page read and write
27687A89000
heap
page read and write
4E7D000
trusted library allocation
page read and write
1C72B231000
heap
page read and write
10CE0000
trusted library allocation
page read and write
10C60000
trusted library allocation
page read and write
26A0000
heap
page read and write
10B47000
trusted library allocation
page read and write
10C7D000
trusted library allocation
page read and write
10D38000
trusted library allocation
page read and write
87A45FE000
unkown
page readonly
27687990000
remote allocation
page execute and read and write
4EE0000
trusted library allocation
page read and write
4B6E000
trusted library allocation
page read and write
2564002B8000
trusted library allocation
page read and write
25D4000
heap
page read and write
1FB3FF80000
heap
page read and write
2564002A0000
trusted library allocation
page read and write
6EB800098000
trusted library allocation
page read and write
21C40213000
heap
page read and write
10EB0000
trusted library allocation
page read and write
438E000
stack
page read and write
743800230000
trusted library allocation
page read and write
6EB800080000
trusted library allocation
page read and write
10B13000
trusted library allocation
page read and write
4A50000
trusted library allocation
page read and write
10BBB000
trusted library allocation
page read and write
4E0A000
trusted library allocation
page read and write
26C3000
heap
page read and write
743800220000
trusted library allocation
page read and write
25D4000
heap
page read and write
6EB800008000
trusted library allocation
page read and write
26BD000
heap
page read and write
4BA4000
trusted library allocation
page read and write
219D0270000
remote allocation
page execute and read and write
1C72B1E0000
heap
page read and write
6EB8000A8000
trusted library allocation
page read and write
48A000098000
trusted library allocation
page read and write
10CB5000
trusted library allocation
page read and write
10CF0000
trusted library allocation
page read and write
297CF390000
remote allocation
page execute and read and write
772C00288000
trusted library allocation
page read and write
22EAF8EA000
heap
page read and write
259C00201000
direct allocation
page read and write
4DC3000
trusted library allocation
page read and write
772C00278000
trusted library allocation
page read and write
5D880002C000
trusted library allocation
page read and write
494C000
stack
page read and write
2650000
trusted library allocation
page read and write
10CA8000
trusted library allocation
page read and write
21C401D0000
remote allocation
page execute and read and write
10CC0000
trusted library allocation
page read and write
29C4002B4000
trusted library allocation
page read and write
743800210000
trusted library allocation
page read and write
6EB800054000
trusted library allocation
page read and write
7438002B4000
trusted library allocation
page read and write
FD881FC000
stack
page read and write
256400260000
trusted library allocation
page read and write
10CC3000
trusted library allocation
page read and write
A951AFD000
stack
page read and write
48A00002C000
trusted library allocation
page read and write
10AF7000
trusted library allocation
page read and write
48A000080000
trusted library allocation
page read and write
4CD9000
trusted library allocation
page read and write
D46000
unkown
page execute read
256400238000
trusted library allocation
page read and write
10AF0000
trusted library allocation
page read and write
297CF600000
heap
page read and write
1BEF000
unkown
page readonly
3BB00003C000
trusted library allocation
page read and write
250E3A00000
heap
page read and write
250E3A54000
heap
page read and write
470E000
stack
page read and write
1438427A000
heap
page read and write
48A000018000
trusted library allocation
page read and write
276879F0000
heap
page read and write
259C00270000
direct allocation
page read and write
25D0000
heap
page read and write
772C002A8000
trusted library allocation
page read and write
7438002A8000
trusted library allocation
page read and write
1C72B1B0000
heap
page read and write
4C5C000
trusted library allocation
page read and write
10DA7000
trusted library allocation
page read and write
259C002A0000
direct allocation
page read and write
7438002B4000
trusted library allocation
page read and write
5D880006C000
trusted library allocation
page read and write
1FB40002000
heap
page read and write
10A15000
trusted library allocation
page read and write
22EAF901000
heap
page read and write
10C20000
trusted library allocation
page read and write
10CA7000
trusted library allocation
page read and write
4E83000
trusted library allocation
page read and write
4DC8000
trusted library allocation
page read and write
29C4002A0000
trusted library allocation
page read and write
4D62000
trusted library allocation
page read and write
1FB40013000
heap
page read and write
10A15000
trusted library allocation
page read and write
4D9F000
trusted library allocation
page read and write
44D1000
heap
page read and write
4C78000
trusted library allocation
page read and write
10A10000
trusted library allocation
page read and write
10A5F000
trusted library allocation
page read and write
4B9E000
trusted library allocation
page read and write
4BD1000
trusted library allocation
page read and write
2691000
direct allocation
page read and write
256400294000
trusted library allocation
page read and write
297CF3E0000
heap
page read and write
10CD0000
trusted library allocation
page read and write
10C78000
trusted library allocation
page read and write
10C7D000
trusted library allocation
page read and write
259C002B4000
direct allocation
page read and write
22EAFAE0000
heap
page read and write
5D8800054000
trusted library allocation
page read and write
10B2D000
trusted library allocation
page read and write
22EAF8F6000
heap
page read and write
10CC7000
trusted library allocation
page read and write
10A57000
trusted library allocation
page read and write
29C400294000
trusted library allocation
page read and write
743800260000
trusted library allocation
page read and write
22EAF8D0000
heap
page read and write
1FB3FF60000
heap
page readonly
10CB4000
trusted library allocation
page read and write
10D30000
trusted library allocation
page read and write
5D8800058000
trusted library allocation
page read and write
4E94000
trusted library allocation
page read and write
4E8E000
trusted library allocation
page read and write
259C00220000
direct allocation
page read and write
29C4002A8000
trusted library allocation
page read and write
219D0458000
heap
page read and write
256400294000
trusted library allocation
page read and write
4E10000
trusted library allocation
page read and write
3BB00006C000
trusted library allocation
page read and write
10B57000
trusted library allocation
page read and write
10A17000
trusted library allocation
page read and write
772C002A8000
trusted library allocation
page read and write
259C002B8000
direct allocation
page read and write
4F59000
trusted library allocation
page read and write
3BB000098000
trusted library allocation
page read and write
26C0000
heap
page read and write
10BC2000
trusted library allocation
page read and write
24FC000
stack
page read and write
219D0240000
remote allocation
page execute and read and write
7438002A8000
trusted library allocation
page read and write
1FB3FF50000
heap
page read and write
4CA7000
trusted library allocation
page read and write
1FB3FF20000
remote allocation
page execute and read and write
10C4A000
trusted library allocation
page read and write
44D1000
heap
page read and write
4F67000
trusted library allocation
page read and write
772C00294000
trusted library allocation
page read and write
2A6E000
stack
page read and write
46CF000
stack
page read and write
256400230000
trusted library allocation
page read and write
1C72B1C0000
heap
page readonly
A951BFE000
stack
page read and write
5D8800070000
trusted library allocation
page read and write
A951CFF000
stack
page read and write
1746000
unkown
page execute read
2694000
direct allocation
page readonly
4E16000
trusted library allocation
page read and write
48A000054000
trusted library allocation
page read and write
3BB000098000
trusted library allocation
page read and write
259D000
stack
page read and write
4F48000
trusted library allocation
page read and write
10AA0000
trusted library allocation
page read and write
25D4000
heap
page read and write
10C83000
trusted library allocation
page read and write
10D45000
trusted library allocation
page read and write
10B0D000
trusted library allocation
page read and write
10BD2000
trusted library allocation
page read and write
219D0450000
heap
page read and write
219D0370000
heap
page read and write
4B52000
trusted library allocation
page read and write
219D1EB0000
heap
page read and write
3BB0000AC000
trusted library allocation
page read and write
48A000070000
trusted library allocation
page read and write
2630000
heap
page read and write
10C85000
trusted library allocation
page read and write
10CB7000
trusted library allocation
page read and write
A9520FB000
stack
page read and write
5D8800008000
trusted library allocation
page read and write
10C20000
trusted library allocation
page read and write
3BB000068000
trusted library allocation
page read and write
10B02000
trusted library allocation
page read and write
4DCF000
trusted library allocation
page read and write
10A72000
trusted library allocation
page read and write
772C00270000
trusted library allocation
page read and write
44D1000
heap
page read and write
4810000
heap
page read and write
10C60000
trusted library allocation
page read and write
25D4000
heap
page read and write
4E4F000
trusted library allocation
page read and write
250E3A27000
heap
page read and write
7D769FB000
stack
page read and write
8D82DFB000
stack
page read and write
4DFC000
trusted library allocation
page read and write
1FB4001F000
heap
page read and write
250E3810000
heap
page read and write
10BB0000
trusted library allocation
page read and write
6EB80008C000
trusted library allocation
page read and write
772C00294000
trusted library allocation
page read and write
29C400274000
trusted library allocation
page read and write
7438002B8000
trusted library allocation
page read and write
140001000
direct allocation
page execute and read and write
26C5000
heap
page read and write
743800201000
trusted library allocation
page read and write
10CCB000
trusted library allocation
page read and write
259C00260000
direct allocation
page read and write
29C400270000
trusted library allocation
page read and write
4A4D000
stack
page read and write
10A7B000
trusted library allocation
page read and write
7438002B4000
trusted library allocation
page read and write
219D03A0000
heap
page read and write
10C67000
trusted library allocation
page read and write
10B08000
trusted library allocation
page read and write
743800264000
trusted library allocation
page read and write
250E3B02000
heap
page read and write
10A1A000
trusted library allocation
page read and write
140001000
direct allocation
page execute and read and write
21C40400000
heap
page read and write
4E49000
trusted library allocation
page read and write
4DBE000
trusted library allocation
page read and write
140001000
direct allocation
page execute and read and write
10C3E000
trusted library allocation
page read and write
42D51FC000
stack
page read and write
5D8800098000
trusted library allocation
page read and write
4C0F000
trusted library allocation
page read and write
10DC0000
trusted library allocation
page read and write
4F6F000
trusted library allocation
page read and write
1D96000
unkown
page readonly
259C00290000
direct allocation
page read and write
2660000
heap
page read and write
3BB00008C000
trusted library allocation
page read and write
10A50000
trusted library allocation
page read and write
4DB8000
trusted library allocation
page read and write
21C404E0000
heap
page readonly
10CCF000
trusted library allocation
page read and write
10B4F000
trusted library allocation
page read and write
219D0700000
heap
page read and write
10CBD000
trusted library allocation
page read and write
10C90000
trusted library allocation
page read and write
10AFD000
trusted library allocation
page read and write
25D4000
heap
page read and write
772C00210000
trusted library allocation
page read and write
10A10000
trusted library allocation
page read and write
743800294000
trusted library allocation
page read and write
4A70000
trusted library allocation
page read and write
6EB80003C000
trusted library allocation
page read and write
772C00294000
trusted library allocation
page read and write
B9931FC000
stack
page read and write
18DE000
unkown
page write copy
3BB000080000
trusted library allocation
page read and write
1C72B21F000
heap
page read and write
772C00230000
trusted library allocation
page read and write
43D0000
heap
page execute and read and write
6EB800068000
trusted library allocation
page read and write
44D1000
heap
page read and write
7438002A8000
trusted library allocation
page read and write
743800294000
trusted library allocation
page read and write
772C00294000
trusted library allocation
page read and write
743800294000
trusted library allocation
page read and write
10AF0000
trusted library allocation
page read and write
AB1000
unkown
page execute read
4BB4000
trusted library allocation
page read and write
2564002A8000
trusted library allocation
page read and write
29C400220000
trusted library allocation
page read and write
772C002A0000
trusted library allocation
page read and write
4B0C000
trusted library allocation
page read and write
143841E0000
heap
page read and write
48A000058000
trusted library allocation
page read and write
2564002A8000
trusted library allocation
page read and write
10BB6000
trusted library allocation
page read and write
194C000
unkown
page write copy
4D5C000
trusted library allocation
page read and write
297CF400000
heap
page read and write
1FB40025000
heap
page read and write
4D52000
trusted library allocation
page read and write
4DAB000
trusted library allocation
page read and write
10B04000
trusted library allocation
page read and write
10C72000
trusted library allocation
page read and write
25D4000
heap
page read and write
29C400250000
trusted library allocation
page read and write
2690000
direct allocation
page readonly
1E18000
unkown
page readonly
4B6C000
trusted library allocation
page read and write
29C4002A8000
trusted library allocation
page read and write
259C00234000
direct allocation
page read and write
143841C0000
remote allocation
page execute and read and write
48A000068000
trusted library allocation
page read and write
6EB800001000
trusted library allocation
page read and write
4AFB000
trusted library allocation
page read and write
4A54000
trusted library allocation
page read and write
2564002B4000
trusted library allocation
page read and write
256400264000
trusted library allocation
page read and write
1C72B202000
heap
page read and write
3BB0000C0000
trusted library allocation
page read and write
5D88000AC000
trusted library allocation
page read and write
25D4000
heap
page read and write
6EB800044000
trusted library allocation
page read and write
1C72B302000
heap
page read and write
48A00003C000
trusted library allocation
page read and write
140001000
direct allocation
page execute and read and write
772C00248000
trusted library allocation
page read and write
256400210000
trusted library allocation
page read and write
4E1B000
trusted library allocation
page read and write
4BDB000
trusted library allocation
page read and write
1C72B200000
heap
page read and write
48A000001000
trusted library allocation
page read and write
297CF6E0000
heap
page readonly
772C00264000
trusted library allocation
page read and write
743800274000
trusted library allocation
page read and write
26A7000
heap
page read and write
3BB000018000
trusted library allocation
page read and write
22EAF9D0000
heap
page read and write
29C400201000
trusted library allocation
page read and write
4F7B000
trusted library allocation
page read and write
10D5F000
trusted library allocation
page read and write
43B0000
heap
page execute and read and write
3BB000001000
trusted library allocation
page read and write
10CD8000
trusted library allocation
page read and write
EDB53FE000
unkown
page readonly
18DE000
unkown
page read and write
3BB000008000
trusted library allocation
page read and write
1BE8000
unkown
page readonly
140001000
direct allocation
page execute and read and write
10CAF000
trusted library allocation
page read and write
29C400278000
trusted library allocation
page read and write
A951EFE000
stack
page read and write
256400294000
trusted library allocation
page read and write
4E57000
trusted library allocation
page read and write
29C400294000
trusted library allocation
page read and write
10EC0000
trusted library allocation
page read and write
743800270000
trusted library allocation
page read and write
140001000
direct allocation
page execute and read and write
7438002B4000
trusted library allocation
page read and write
10CC5000
trusted library allocation
page read and write
7438002B4000
trusted library allocation
page read and write
219D0705000
heap
page read and write
10D68000
trusted library allocation
page read and write
6EB80006C000
trusted library allocation
page read and write
25D4000
heap
page read and write
5D8800068000
trusted library allocation
page read and write
1B40000
unkown
page read and write
21C40200000
heap
page read and write
4C76000
trusted library allocation
page read and write
743800278000
trusted library allocation
page read and write
10BC8000
trusted library allocation
page read and write
48A00006C000
trusted library allocation
page read and write
14384275000
heap
page read and write
1C72B213000
heap
page read and write
743800288000
trusted library allocation
page read and write
10A1B000
trusted library allocation
page read and write
772C00260000
trusted library allocation
page read and write
10C6D000
trusted library allocation
page read and write
250E3A2F000
heap
page read and write
5D8800001000
trusted library allocation
page read and write
3BB0000A8000
trusted library allocation
page read and write
259C002CC000
direct allocation
page read and write
44D1000
heap
page read and write
10D70000
trusted library allocation
page read and write
743800248000
trusted library allocation
page read and write
21EC000
stack
page read and write
1FB40000000
heap
page read and write
44D1000
heap
page read and write
10A50000
trusted library allocation
page read and write
259C00274000
direct allocation
page read and write
4D6A000
trusted library allocation
page read and write
10AA7000
trusted library allocation
page read and write
14384580000
heap
page read and write
EDB4BFE000
stack
page read and write
10B15000
trusted library allocation
page read and write
1C72B21D000
heap
page read and write
259C0024C000
direct allocation
page read and write
250E3A11000
heap
page read and write
25D4000
heap
page read and write
29C400260000
trusted library allocation
page read and write
256400278000
trusted library allocation
page read and write
25D4000
heap
page read and write
14384220000
heap
page read and write
29C400264000
trusted library allocation
page read and write
29C400230000
trusted library allocation
page read and write
21C40500000
heap
page read and write
4DA5000
trusted library allocation
page read and write
21C40202000
heap
page read and write
27687A80000
heap
page read and write
25D4000
heap
page read and write
21C40256000
heap
page read and write
A951FFF000
stack
page read and write
48A0000AC000
trusted library allocation
page read and write
140001000
direct allocation
page execute and read and write
259C00210000
direct allocation
page read and write
22EAF8F0000
heap
page read and write
10C80000
trusted library allocation
page read and write
4E1D000
trusted library allocation
page read and write
3BB000058000
trusted library allocation
page read and write
3BB0000B8000
trusted library allocation
page read and write
5D8800044000
trusted library allocation
page read and write
22EAF8D8000
heap
page read and write
3BB000064000
trusted library allocation
page read and write
250E3920000
heap
page read and write
6EB8000AC000
trusted library allocation
page read and write
261D000
stack
page read and write
10AA0000
trusted library allocation
page read and write
259C00280000
direct allocation
page read and write
25D4000
heap
page read and write
26BD000
heap
page read and write
5D880008C000
trusted library allocation
page read and write
10D3F000
trusted library allocation
page read and write
4CBF000
trusted library allocation
page read and write
250E3910000
heap
page readonly
1C72B190000
heap
page read and write
10A7F000
trusted library allocation
page read and write
10B07000
trusted library allocation
page read and write
10B3F000
trusted library allocation
page read and write
4BFE000
trusted library allocation
page read and write
4D57000
trusted library allocation
page read and write
7438002B8000
trusted library allocation
page read and write
29C400248000
trusted library allocation
page read and write
5D8800064000
trusted library allocation
page read and write
48A00008C000
trusted library allocation
page read and write
256400294000
trusted library allocation
page read and write
25D4000
heap
page read and write
2681000
direct allocation
page execute read
29C400238000
trusted library allocation
page read and write
26C5000
heap
page read and write
1C72B225000
heap
page read and write
3BB000054000
trusted library allocation
page read and write
297CF700000
heap
page read and write
4D66000
trusted library allocation
page read and write
21C401E0000
heap
page read and write
1C72B237000
heap
page read and write
10E47000
trusted library allocation
page read and write
10C8B000
trusted library allocation
page read and write
10A8F000
trusted library allocation
page read and write
772C002B4000
trusted library allocation
page read and write
10E40000
trusted library allocation
page read and write
48A000064000
trusted library allocation
page read and write
48A000008000
trusted library allocation
page read and write
4DB2000
trusted library allocation
page read and write
4F56000
trusted library allocation
page read and write
4B01000
trusted library allocation
page read and write
29C4002B8000
trusted library allocation
page read and write
10AA0000
trusted library allocation
page read and write
259C00240000
direct allocation
page read and write
256400201000
trusted library allocation
page read and write
259C00230000
direct allocation
page read and write
2650000
trusted library allocation
page read and write
14384200000
heap
page read and write
1FB40102000
heap
page read and write
256400288000
trusted library allocation
page read and write
297CF3D0000
remote allocation
page execute and read and write
4C8D000
trusted library allocation
page read and write
4F80000
trusted library allocation
page read and write
22EAFB80000
heap
page read and write
10B0D000
trusted library allocation
page read and write
5D88000A8000
trusted library allocation
page read and write
10C66000
trusted library allocation
page read and write
6EB800058000
trusted library allocation
page read and write
14384269000
heap
page read and write
1953000
unkown
page read and write
22EAFAC0000
heap
page read and write
2670000
direct allocation
page execute read
AB0000
unkown
page readonly
297CF502000
heap
page read and write
21C40241000
heap
page read and write
743800250000
trusted library allocation
page read and write
4B12000
trusted library allocation
page read and write
1FB3FF30000
heap
page read and write
10DB8000
trusted library allocation
page read and write
4D6D000
trusted library allocation
page read and write
29C400294000
trusted library allocation
page read and write
10BCD000
trusted library allocation
page read and write
4323000
direct allocation
page read and write
5D8800018000
trusted library allocation
page read and write
10CA0000
trusted library allocation
page read and write
250E3A13000
heap
page read and write
25D4000
heap
page read and write
3BB0000A8000
trusted library allocation
page read and write
10A50000
trusted library allocation
page read and write
10AF6000
trusted library allocation
page read and write
10E58000
trusted library allocation
page read and write
2564002B4000
trusted library allocation
page read and write
4BCB000
trusted library allocation
page read and write
27687A99000
heap
page read and write
256400248000
trusted library allocation
page read and write
5158000
trusted library allocation
page read and write
29C400294000
trusted library allocation
page read and write
21C42202000
heap
page read and write
4E60000
trusted library allocation
page read and write
6EB800070000
trusted library allocation
page read and write
27687A10000
heap
page read and write
259C00250000
direct allocation
page read and write
250E3A41000
heap
page read and write
7438002A8000
trusted library allocation
page read and write
22EAF8B0000
remote allocation
page execute and read and write
250E3830000
heap
page read and write
4D4D000
trusted library allocation
page read and write
3BB000044000
trusted library allocation
page read and write
87A3DFE000
stack
page read and write
2650000
direct allocation
page read and write
4350000
trusted library allocation
page read and write
44ED000
heap
page read and write
29C4002B4000
trusted library allocation
page read and write
772C00201000
trusted library allocation
page read and write
431B000
direct allocation
page read and write
297CF413000
heap
page read and write
5D880003C000
trusted library allocation
page read and write
26C0000
heap
page read and write
25D4000
heap
page read and write
7438002B4000
trusted library allocation
page read and write
1BE8000
unkown
page readonly
6EB800064000
trusted library allocation
page read and write
4F4D000
trusted library allocation
page read and write
21C42000000
heap
page read and write
10B1B000
trusted library allocation
page read and write
219D0290000
heap
page read and write
7438002C8000
trusted library allocation
page read and write
276879D0000
remote allocation
page execute and read and write
6EB800018000
trusted library allocation
page read and write
10F40000
trusted library allocation
page read and write
29C400210000
trusted library allocation
page read and write
A951DFD000
stack
page read and write
4E6A000
trusted library allocation
page read and write
21C40302000
heap
page read and write
4BF8000
trusted library allocation
page read and write
4E02000
trusted library allocation
page read and write
10CAD000
trusted library allocation
page read and write
44D1000
heap
page read and write
772C002B4000
trusted library allocation
page read and write
10AFB000
trusted library allocation
page read and write
4E5C000
trusted library allocation
page read and write
1D15000
unkown
page readonly
48A0000A8000
trusted library allocation
page read and write
48A000044000
trusted library allocation
page read and write
259C00294000
direct allocation
page read and write
22EAF8FC000
heap
page read and write
10C20000
trusted library allocation
page read and write
10DA0000
trusted library allocation
page read and write
140001000
direct allocation
page execute and read and write
5D8800080000
trusted library allocation
page read and write
29C400288000
trusted library allocation
page read and write
256400274000
trusted library allocation
page read and write
1C72B22E000
heap
page read and write
256400250000
trusted library allocation
page read and write
4BE1000
trusted library allocation
page read and write
2550000
heap
page read and write
1FB3FEE0000
remote allocation
page execute and read and write
7438002A0000
trusted library allocation
page read and write
3BB000070000
trusted library allocation
page read and write
27687A50000
heap
page read and write
There are 591 hidden memdumps, click here to show them.